Actions taken at the 11-20 April 2011 Study Group 17 meeting
Recommendations approved (TAP – Resolution 1)
Q. |
Recommendation |
Editor |
Location of Text |
Equivalent e.g., ISO/IEC |
Acronym |
Title |
4 |
X.1500 |
Overview of cybersecurity information exchange (CYBEX) |
Stephen Adegbite, Inette Furey, Youki Kadobayashi, Robert A. Martin, Damir Rajnovic, Gavin Reid, Anthony Rutkowski, Gregg Schudel, Takeshi Takahashi |
TD 1669 Rev. 4 |
|
4 |
X.1520 |
Common vulnerabilities and exposures (CVE) |
Robert Martin, Anthony Rutkowsi |
TD 1677 Rev. 1 |
|
4 |
X.1521 |
Common vulnerability scoring system (CVSS) |
Damir Rajnovic, Gavin Reid, Gregg Schudel |
TD 1685 Rev. 1 |
|
|
Recommendations not approved (TAP – Resolution 1)
Q. |
Recommendation |
Editor |
Location of Text |
Equivalent e.g., ISO/IEC |
Acronym |
Title |
10 |
X.1261 Note 1 |
Extended validation certificate framework (EVcert)
|
Anthony Rutkowski |
COM 17 – R 30 |
CA Browser Forum |
|
Recommendations determined (TAP – Resolution 1)
Q. |
Recommendation |
Editor |
Location of Text |
Equivalent e.g., ISO/IEC |
Acronym |
Title |
4, (12) |
X.1570 (X.cybex-disc) |
Discovery mechanisms in the exchange of cybersecurity information |
Youki Kadobayashi, Takeshi Takahashi |
COM 17 – R 35 |
|
4 |
X.1211 (X.tb-ucc) |
Usability of network traceback |
Takeshi Takahashi, Huirong Tian, Heung-Youl Youm |
COM 17 – R 33 |
|
5 |
X.1246 (X.tcs-2) |
Real-time blocking list (RBL)-based framework for countering VoIP spam |
Seokung Yoon |
COM 17 – R 34 |
|
10 |
X.1253 (X.idmsg) |
Security guidelines for identity management systems |
Sangrae Cho |
COM 17 – R 38 |
|
|
Recommendations consented (AAP – Recommendation A.8)
Q. |
Recommendation |
Editor |
Location of Text |
Equivalent e.g., ISO/IEC |
Acronym |
Title |
3 |
X.1052 (X.ismf) |
Information security management framework |
Minshi Chen, Lijun Liu, Zhi Zhou |
TD 1513 Rev. 3 |
|
3 |
X.1057 (X.amg) |
Asset management guidelines in telecommunication organizations |
Taein Jung, Jintae Lee |
TD 1688 Rev. 4 |
|
6 |
X.1192 (X.iptvsec-2) |
Functional requirements and mechanisms for the secure transcodable scheme of IPTV |
Jae Hoon Nah |
TD 1772 Rev. 3 |
|
9 |
X.1090 (X.ott) |
Authentication framework with one-time telebiometric template |
Hyung-Woo Lee, Yongjin Lee |
TD 1820 Rev. 1 |
|
12 |
X.660rev |
Information technology – Procedures for the operation of Object Identifier Registration Authorities: General procedures and top arcs of the International Object Identifier tree |
Olivier Dubuisson |
TD 1484 Rev. 1 |
ISO/IEC 9834-1 |
The above draft Recommendations ITU-T (except X.660 revised) were sent to AAP Last Call #58 on 1st May 2011. Draft Recommendation ITU-T X.660 revised was agreed to be sent to AAP Last Call#62 on 1st July 2011, to allow for synchronization of the approval procedure with ISO/IEC JTC 1 according to Recommendation ITU-T A.23. For X.1052, X1057, X.1192 and X.1090 no comments were received by the deadline on 28 May 2011. The four texts (X.1052, X.1057, X.1090, and X.1192) were approved as announced in AAP#60 dated 31, May 2011. For X.660, no comments were received by the deadline 28 July 2011. X.660 was approved as announced in AAP#64 dated 1 August 2011. |
|